How to switch on your computer remotely.
The way to avoid data loss is to have backup copies.
What is a password manager, and which one should you use, if any?
What to do when you're at high risk to be the target of an attack.
You only know it works when you've tested it.
Find out how to recognize fake emails.
Hiding your IP address.
Avoid to leave your fingerprint.
Obtaining an anonymous email account.
Where to start when building an apparmor profile for an application.
How to properly set up and use the Linux Audit System to find out
who modified some file.
Some simple ways of getting information about
a running process.
Performance comparison of GCC versions ranging from 3.3.6 to
4.6.0. Also includes results for LLVM (upto 3.0).
This article is intended to give a short but concise howto
for running firefox (or any other graphical application) under
a different (nonprivileged) user.
Everybody writes about proactive security, thus this article
focuses on something different:
"intrusion resistance", i.e. the ability to confine
an intrusion and limit the potential damage.
Suggestions for detecting intruders hiding under the identity of
legitimate shell users.
An overview of different methods (and their respective
trade-offs)for dealing with the problem.
This comparison focuses on technical performance — in
in corner cases which are likely to reveal problems —,
than simply listing and comparing features.
A paper describing different ways of subverting the
Linux kernel, and methods for detection of kernel
What works, and what doesn't.
PGP signatures on open
source software, and why you should check them.
Some remarks on passwords and various kinds of password generators.
How to determine what internet services are running on your machine, and how to switch
Helps you to hide your email address from spambots that harvest addresses from
Beginners tutorial / howto / guide on compiling applications from source.